Keyword: securitybreach
-
The U.S. Department of Defense secured an exposed server on Monday that was spilling internal U.S. military emails to the open internet for the past two weeks. The exposed server was hosted on Microsoft’s Azure government cloud for Department of Defense customers, which uses servers that are physically separated from other commercial customers and as such can be used to share sensitive but unclassified government data. The exposed server was part of an internal mailbox system storing about three terabytes of internal military emails, many pertaining to U.S. Special Operations Command, or USSOCOM, the U.S. military unit tasked with conducting...
-
Washington — Another intruder has breached one of the nation's most sensitive military bases — the home of Air Force One — and this time a resident opened fire on the trespasser, Joint Base Andrews said in a statement late Monday. During the incident, which occurred at about 11:30 a.m. Monday, "a man gained unauthorized access to a JBA housing area," Joint Base Andrews said in the statement posted to Twitter. "A resident discharged a firearm, security forces arrived on scene to apprehend the intruder....
-
As the November midterm election draws near, the focus is on voting protocols and tools, especially the voting machines themselves. After the 2020 election, many irregularities in voting were documented across the country, some due to mail-in voting, some due to voting rosters, some due to poll workers, and some due to machines that were somehow hacked or compromised in some way. GPB News reports: “Sensitive voting system passwords posted online. copies of confidential voting software are available for download. Ballot counting machines inspected by people not supposed to have access. The list of suspected security breaches at local election...
-
An affair between two U.K. Royal Navy officers serving on nuclear submarines threatened the security of the country’s nuclear deterrent, according to the judge at a military court. The two individuals have both been formally discharged from the navy and have received suspended prison sentences. Details of the 2020 incident were made public following a recent court-martial. The two officers, Lt. Sophie Brook and Lt. Cdr. Nicholas Stone, were serving aboard the Vanguard class ballistic missile submarine HMS Victorious and the Astute class nuclear attack submarine HMS Ambush, respectively. Lt. Brook was a watch leader aboard Victorious at the time...
-
WASHINGTON — House Judiciary Committee Republicans are demanding that 51 former intelligence operatives divulge information about their 2020 statement that documents from Hunter Biden’s laptop could be Russian disinformation — with a senior GOP aide telling The Post that the ex-spies should expect subpoenas next year if they fail to comply.
-
CDMedia has confirmed the Hunter Biden infamous ‘laptop from Hell’ contains many U.S. Department of Defense ‘root encryption certificates’, or encryption keys to DoD databases. The keys have unusual long-term expiration dates, with many lasting twenty years or more. This information was discovered during a deep forensic investigation done over the last couple weeks, by Jack Maxey and his team in Switzerland. This situation raises multiple questions, such as… Why did Hunter Biden have a large number of Department of Defense encryption codes to allow access to national security data? Did Hunter Biden give anyone else access to this information?...
-
THE US has been targeted by a cyber attack in a "possible serious breach", according to sources. Fox News' White House Correspondent Jacquie Heinrich tweeted: "The State Department has been hit by a cyber attack, and notifications of a possible serious breach were made by the Department of Defense Cyber Command. "It is unclear when the breach was discovered, but it is believed to have happened a couple weeks ago. "A source familiar tells Fox the State Department’s ongoing mission to evacuate Americans and allied refugees in Afghanistan “have not been affected”. "The extent of the breach, investigation into the...
-
The Department of Justice announced Wednesday that a counterterrorism analyst has been arrested for leaking classified information to members of the media, including one person with whom he was apparently romantically involved.Law enforcement took Defense Intelligence Agency official Henry Kyle Frese, 30, into custody Tuesday morning when he arrived at work. He has been indicted in federal court in Virginia.Frese, who had top-secret clearance, is accused of leaking classified material regarding a foreign nation’s weapons system to two reporters last year and this year.One of the reporters Frese leaked to was involved in a romantic relationship with him at the time and...
-
FBI uncovered 340,000 Clinton emails on Weiner's devices, new book claims Sent to Huma Abedin, Weiner's estranged wife, using hillaryclinton.com address They were found during a probe into Weiner's lewd messages to an teen girl DailyMail.com revealed in 2016 that Weiner had an online relationship with her The discovery, according to one agent, was like 'dropping a bomb' in a room But the emails fell through the cracks at the FBI because of the Russia probe James Comey probed Clinton's private email server days before 2016 election ============================================================ Stunned FBI agents who uncovered thousands of Hillary Clinton emails while examining...
-
Yujing Zhang, the Chinese woman arrested at Mar-a-Lago, President Donald Trump's private Florida club, earlier this year, has been found guilty on counts of unlawfully entering a restricted building and making false statements to a federal officer. Prosecutors called nine witnesses in a trial that lasted two days. Zhang chose to represent herself during the trial with assistance from the Federal Public Defender's office and court-appointed translators. Zhang faces up to six years in prison. She will be sentenced in late November.
-
House Oversight Committee Republicans on Tuesday formally called for an immediate hearing on security breaches at the State Department during Hillary Clinton's leadership, after the department said Monday it had uncovered "multiple security incidents" involving more than a dozen employees. In a letter to Committee Chairman Elijah Cummings, D-Md., ranking committee Republicans Jim Jordan, Mark Meadows and Jody Hice said State Department officials conducting the ongoing security review into the matter should testify. "We request a hearing to examine widespread security protocol breaches at the State Department concerning former Secretary Hillary Clinton’s private email server," the Republicans wrote. "The unorthodox...
-
The Chinese national who bluffed her way past two Secret Service details at President Trump’s Mar-a-Largo resort was carrying a thumb drive loaded with malware and a trove of other spy gear, authorities said Monday. Now the FBI is investigating whether Yujing Zhang, 33, is an agent of the Chinese government. “She lies to everyone she encounters,” Assistant US Attorney Rolando Garcia said during Zhang’s bond hearing Monday. “Her ties are all in China.’’ Zhang was busted at Mar-a-Largo on March 30, after giving conflicting reasons for being there during one of Trump’s routine weekend visits, officials said. The president...
-
A US Secret Service agent inserted a USB drive infected with "malicious malware" into his laptop after the hardware was confiscated from a Chinese woman who was arrested late last month after attempting to gain entry to President Donald Trump's Mar-a-Lago resort. Agent Samuel Ivanovich testified in court on Monday that he put the thumb drive into his own computer, and it began installing files in a "very out-of-the-ordinary" way. He quickly stopped his analysis of the drive, the Miami Herald reported.
-
Secret Service Director Randolph Alles has reportedly been fired by President Trump after a Chinese woman carrying malware and hard drives made her way into Mar-a-Lago two weeks ago. BREAKING: White House says Secret Service Director Randolph Alles to leave post shortly pic.twitter.com/02EAOJZBGu— Reuters Top News (@Reuters) April 8, 2019 More on the breach from CBS Miami: A Chinese woman accused of illegally entering President Donald Trump’s Mar-a-Lago club with a flash drive containing malware, also had numerous electronic devices and thousands in cash stashed in her hotel room. That from federal prosecutors Monday at Yujing Zhang’s detention hearing in...
-
FRANKFURT (Reuters) - A user of Amazon’s Alexa voice assistant in Germany got access to more than a thousand recordings from another user because of “a human error” by the company. The customer had asked to listen back to recordings of his own activities made by Alexa but he was also able to access 1,700 audio files from a stranger when Amazon sent him a link, German trade publication c’t reported. “This unfortunate case was the result of a human error and an isolated single case,” an Amazon spokesman said on Thursday. The first customer had initially got no reply...
-
Marriott International said early Friday that data on roughly 500 million customers staying at Starwood hotel properties had been compromised in a breach that gave unknown attackers access to the Starwood network since 2014. The company said it has not finished identifying duplicate information in the database, but believes it contains information on up to approximately 500 million guests who made a reservation at a Starwood property. The hotel giant said that on September 8, 2018, it received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database. The company said it “quickly...
-
This story, which broke on Nov. 2, got mighty little attention from the national media. I wonder why: In 2013, hundreds of CIA officers — many working nonstop for weeks — scrambled to contain a disaster of global proportions: a compromise of the agency’s internet-based covert communications system used to interact with its informants in dark corners around the world. Teams of CIA experts worked feverishly to take down and reconfigure the websites secretly used for these communications; others managed operations to quickly spirit assets to safety and oversaw other forms of triage. “When this was going on, it was...
-
More than 70 foreign nationals working as spies for the CIA in Iran and China were systematically identified and slaughtered in the past decade, due to a ridiculously weak web-based system the CIA used to communicate with foreign assets it couldn’t reach directly. This according to a devastating November 2 report in Yahoo News written by journalists Zach Dorfman and Jenna McLaughlin (center-left, but generally trustworthy). Although the Iranian roll-up occurred in 2011, and the Chinese rout occurred from 2010 to 2012, the CIA did not remedy the root cause of the problem in its transient messaging scheme until 2013,...
-
For several months during Bill Clinton's administration, a former top military officer says the White House lost the card with a set of numbers for opening the briefcase containing the codes for a nuclear attack. Gen Hugh Shelton, who was Chairman of the Joint Chiefs of Staff at the time, said in his new memoir, "Without Hesitation: The Odyssey of an American Warrior" that "the codes were actually missing for months. That's a big deal -- a gargantuan deal." A similar claim was made by Lt Col Robert Patterson, a former aide, in a book published seven years ago. He...
-
The Justice Department on Tuesday unsealed charges against a group of Chinese intelligence officers, alleging that they hacked into a series of private companies’ computer systems in the U.S. and abroad as part of an effort to steal sensitive commercial aviation data. Zha Rong, Chai Meng and seven other co-conspirators worked to steal intellectual property and other sensitive data from over a dozen companies so that China could develop a turbofan engine "without incurring substantial research and development expenses," according to the to the indictment. "Members of the conspiracy targeted, among other things, companies in the aerospace and other high-technology...
|
|
|